SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Exploits stories

Story image
Cybersecurity is your defensive strategy, cyber resilience is your business
Last month
#
ransomware
#
cybersecurity
#
disruption
In light of the massive cybersecurity breach impacting Ivanti solutions, firms are urged to embrace cyber resilience for business continuity, demonstrating greater fortitude against potential disruptions.
Story image
Data Theorem sweeps 2023 CyberSecured Awards with cloud & mobile protections
Thu, 28th Dec 2023
#
cloud services
#
application security
#
multi-cloud
Data Theorem's Cloud Secure and Mobile Protect acclaimed for top cloud security and mobile API threat protection at 2023 CyberSecured Awards.
Story image
First Azul State of Java survey reveals Java's crucial role in tech industry
Wed, 25th Oct 2023
#
cloud services
#
private cloud
#
hybrid cloud
Azul's inaugural State of Java survey highlights Java's vital role in global tech, with 98% of firms reporting usage.
Story image
Cequence brings API protection to HPE GreenLake Marketplace
Wed, 18th Oct 2023
#
compliance
#
exploits
#
fraud
Cequence Security offers first-ever API protection on the HPE GreenLake Marketplace, promoting visibility, reduced costs, and minimised business risks.
Story image
Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack
Fri, 13th Oct 2023
#
cloud services
#
public cloud
#
aws
An attacker attempted to exploit the open-source community by uploading a series of malicious packages to the PyPi package manager.
Story image
Recorded Future discloses new high-risk vulnerabilities
Tue, 19th Sep 2023
#
microsoft
#
compliance
#
security vulnerabilities
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
Story image
CyFox identifies critical hijacking vulnerability in popular streaming software
Thu, 3rd Aug 2023
#
video
#
physical security
#
cios
Critical hijacking vulnerability in Stremio 4.4 puts 5 million users at risk; remote code execution and information theft possible.
Story image
Claroty reveals five vulnerabilities in NETGEAR RAX30 routers
Fri, 19th May 2023
#
cybersecurity
#
cios
#
router
Claroty’s research arm, Team82, has disclosed five vulnerabilities in NETGEAR’s RAX30 routers they discovered at the Pwn2Own Toronto hacking competition.
Story image
Attackers deploying exploits faster than ever, finds Rapid7
Wed, 1st Mar 2023
#
cybersecurity
#
exploits
#
security vulnerabilities
Rapid7 Vulnerability Intelligence Report finds attackers developing and deploying exploits faster, with an 87% increase in first-week exploitation since 2020.
Story image
Secureworks finds Iranian threat group back with new persona
Wed, 1st Feb 2023
#
advanced persistent threat protection
#
disruption
#
data leak
Secureworks has found that the Iranian threat group, Cobalt Sapling, has reemerged with a new persona, Abraham's Ax.
Story image
Claroty’s Team82 finds vulnerabilities in historian server
Thu, 19th Jan 2023
#
breach prevention
#
cybersecurity
#
security vulnerabilities
Claroty's research team, Team82, has examined the GE Proficy Historian, finding five exploitable vulnerabilities capable of causing damage to the system.
Story image
GreyNoise Intelligence identifies exploitation threats for 2023
Fri, 23rd Dec 2022
#
advanced persistent threat protection
#
cybersecurity
#
cios
GreyNoise Intelligence unveils its 2022 Mass Exploitation Report, delving deep into threat detection events from the past year.
Story image
Lookout finds predatory behaviour on 300 loan apps
Thu, 1st Dec 2022
#
application security
#
email security
#
casb
Almost 300 loan apps found in Africa, Southeast Asia, India, Colombia, and Mexico exhibit predatory behavior, says Lookout.
Story image
Attackers use automation to increase speed from exploits
Thu, 20th Oct 2022
#
cloud security
#
exploits
#
automation
Attackers are advancing to keep pace with cloud adoption and response time, according to a new report from Lacework.
Story image
52% of ransomware incidents started with compromise of unpatched remote services
Thu, 6th Oct 2022
#
ransomware
#
cybersecurity
#
secureworks
The exploitation in remote services has become the primary initial access vector in ransomware attacks over the past year.
Story image
Cybersecurity loopholes prevalent in South East Asia
Tue, 27th Sep 2022
#
advanced persistent threat protection
#
cybersecurity
#
exploits
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Story image
Dramatic uptick in threat activity with exploits growing nearly 150%
Thu, 11th Aug 2022
#
exploits
#
cyber attacks
#
log4j
Threat activity has spiked in Q2 2022, with malware events rising by 25%, botnets doubling, and exploit activity growing almost 150%, says Nuspire's report.
Story image
2021 the year cyber criminals got creative - Proofpoint
Wed, 8th Jun 2022
#
cybersecurity
#
cios
#
proofpoint
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
Story image
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
Thu, 19th May 2022
#
ddos
#
malware
#
advanced persistent threat protection
Nuspire's Q1 2022 Threat Report reveals surge in threat actor activity as new vulnerabilities emerge. Mirai, STRRAT and Emotet see a resurgence.
Story image
Infoblox's State of Security Report spotlights Australian remote work hazards
Wed, 18th May 2022
#
casb
#
dlp
#
cybersecurity
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Use of malware, botnets and exploits expands in Q1 2022
Thu, 12th May 2022
#
malware
#
ddos
#
microsoft
Malware, botnet, and exploit activity increased in Q1 2022, according to a report by managed security services provider Nuspire.
Story image
WordPress vulnerabilities more than doubled in 2021
Thu, 13th Jan 2022
#
cybersecurity
#
cios
#
wordpress
WordPress vulnerabilities have more than doubled in 2021, with 77% of them being exploitable, according to Risk Based Security.
Story image
Log4j actively exploited, serious complications can occur according to CERT NZ
Mon, 13th Dec 2021
#
cloud services
#
breach prevention
#
web development
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Companies exploited by high-risk vulnerabilities, new research shows
Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.